|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
CAS, NLP |
2009-01-23 14:55 |
Miyazaki |
|
Network Visualization of Electronical Medical Record(IZANAMI) by Using Mining Technology Muneo Kushima, Kenji Araki, Muneou Suzuki, Sanae Araki, Hiroki Tamura, Koichi Tanno, Takako Toyama, Okihiko Ishizuka (Unversity of Miyazaki), Mitsuru Ikeda (JAIST) CAS2008-97 NLP2008-127 |
It is an important research assignment of the medical information field to make an effective use of the treatment inform... [more] |
CAS2008-97 NLP2008-127 pp.187-192 |
IT, ISEC, WBS |
2007-03-16 09:45 |
Gunma |
Gunma Univ. (Kiryu Campus) |
Key Update by Broadcast Encryption for Wireless Sensor Networks Taketsugu Yao, Ryohei Konuma, Shigeru Fukunaga, Toshihisa Nakai (OKI) |
We propose the key update scheme for multi-hop tree topology networks, which effectively update the network key by assig... [more] |
IT2006-96 ISEC2006-151 WBS2006-93 pp.65-70 |
ISEC |
2006-09-13 16:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Key Predistribution Schemes for Sensor Networks Using Lines and Points over a Finite Geometry Ritsuko Matsumoto, Hisashi Mouri, Yuichi Kaji (NAIST) |
This study investigates new schemes for distributing cryptographic keys in sensor networks. Sharing a key is the very fi... [more] |
ISEC2006-85 pp.97-104 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 13:00 |
Okayama |
Okayama Univ. |
Hierarchical Key Assignment for Efficient Public-Key Black-Box Tracing against Self-Defensive Pirates Tatsuyuki Matsushita (Toshiba Corp.), Hideki Imai (Chuo Univ., AIST) |
We propose a hierarchical key-assignment method by which the transmission overhead in a public-key black-box tracing sch... [more] |
ISEC2006-52 pp.91-98 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 09:30 |
Iwate |
Iwate Prefectural University |
A Group Key Management Scheme for Secure Multicast Increasing Efficency in Leave Operation Alireza Nemaney Pour, Kazuya Kumekawa, Toshihiko Kato, Shuichi Itoh (The Univ. of Electro-Communications) |
This paper proposes an efficient model and the associated algorithm for the group key management in secure multicast. In... [more] |
ISEC2005-43 pp.1-8 |
PRMU, TL |
2005-03-18 16:45 |
Akita |
|
Construction of the Motion Database System whose Contents can be Searched by a Motion Name Takashi Yukawa (Akita Keho Univ. Jr. Col.), Naoko Obara, Hideo Tamamoto (Akita Univ.) |
In order to reuse the human motion data recorded by the motion capture system, we have proposed a motion database constr... [more] |
TL2004-96 PRMU2004-264 pp.193-197 |
IT, WBS, ISEC |
2005-03-18 15:55 |
Kyoto |
Kyoto Univ. |
Variable Data-length Encryption Using Arithmetic Operations Takeshi Tounai, Hisashi Suzuki (Chuo Univ) |
This article proposes an algorithm which adaptive arithmetic coding is applied to for an encryption, which converts any ... [more] |
IT2004-87 ISEC2004-143 WBS2004-202 pp.89-94 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|